Mostrando 6,701 - 6,720 Resultados de 14,789 Para Buscar 'Honiton~', tiempo de consulta: 1.77s Limitar resultados
  1. 6701
    Publicado 2019
    Tabla de Contenidos: “…. -- "A long train of hideous consequences" : Boston, capital punishment, and the transformation of Republicanism, 1780-1805 / Alan Rogers -- Power and social responsibility : entrepreneurs and the Black community in Antebellum Boston / Lois E. Horton and James Oliver Horton -- The secret world of radical publishers : the case of Thayer and Eldridge of Boston / Albert J. von Frank -- "Lawless and unprincipled" : women in Boston's Civil War draft riot / Judith Ann Giesberg -- Portrait of a parish : race, ethnicity, and class in Boston's Cathedral of the Holy Cross, 1865-1880 / James M. …”
    Libro electrónico
  2. 6702
    Publicado 2022
    Tabla de Contenidos: “…. / Nathan Mladin -- 4 Credit Unions in the UK: Promoting Saving and Dealing with Debt Martin Groombridge, in conversation with Amy Horton and Christopher Harker -- PART II Rewriting the rules -- 5 Could We Stop Worrying and Learn to Love Bankruptcy? …”
    Libro electrónico
  3. 6703
    Publicado 2023
    Tabla de Contenidos: “…Configuring Azure Endpoint Protection for VMs -- Enabling Update Management in Azure Portal -- Configuring Security for Container Services -- Managing Access to the Azure Container Registry -- Configuring Security for Serverless Compute -- Microsoft Recommendations -- Configuring Security for an Azure App Service -- Exam Essentials -- Review Questions -- Chapter 4 Managing Security Operations -- Configure Centralized Policy Management -- Configure a Custom Security Policy -- Create Custom Security Policies -- Creating a Policy Initiative -- Configuring Security Settings and Auditing by Using Azure Policy -- Configuring and Managing Threat Protection -- Configuring Microsoft Defender for Cloud for Servers (Not Including Microsoft Defender for Endpoint) -- Configuring Microsoft Defender for SQL -- Using the Microsoft Threat Modeling Tool -- Azure Monitor -- Visualizations in Azure Monitor -- Configuring and Managing Security Monitoring Solutions -- Creating and Customizing Alert Rules by Using Azure Monitor -- Configuring Diagnostic Logging and Retention Using Azure Monitor -- Monitoring Security Logs Using Azure Monitor -- Microsoft Sentinel -- Configuring Connectors in Microsoft Sentinel -- Evaluating Alerts and Incidents in Microsoft Sentinel -- Summary -- Exam Essentials -- Review Questions -- Chapter 5 Securing Data and Applications -- Configuring Security for Storage in Azure -- Storage Account Access Keys -- Configuring Access Control for Storage Accounts -- Configuring Storage Account Access Keys -- Configuring Azure AD Authentication for Azure Storage and Azure Files -- Configuring Delegated Access for Storage Accounts -- Configuring Security for Databases -- Summary -- Exam Essentials -- Review Questions -- Appendix A: An Azure Security Tools Overview -- Chapter 2, "Managing Identity and Access on Microsoft Azure"…”
    Libro electrónico
  4. 6704
    Tabla de Contenidos: “…-- How can sustainable development strategies be monitored? -- Busy readers' guide to this document -- 1. …”
    Libro electrónico
  5. 6705
    Publicado 2012
    Tabla de Contenidos: “…¿Infusión o bolos?; 6 Monitores de la función neuromuscular; 7 Tipos de estímulos (...); 8 Sugammadex: un nuevo enfoque en la reversión del bloqueo neuromuscular; 9 Importancia y principios del monitoreo de la función neuromuscular; Índice alfabético…”
    Libro electrónico
  6. 6706
    Publicado 2019
    Tabla de Contenidos: “…/ (The failure of) public law and the deliberative turn / The postnational horizon of constitutionalism and public law : paradigm extension or paradigm exhaustion? …”
    Libro
  7. 6707
    Publicado 2006
    Tabla de Contenidos: “…Enhancing South-East Asia's Security: The Aceh Monitoring Mission; 6. ASEM and the Expanding China-European Union Relationship; 7. …”
    Libro electrónico
  8. 6708
    Tabla de Contenidos: “…Changes of the Electrophysiological Study in Dogs with Acute Spinal Cord Injury -- Preliminary Report of Combined Microscopic Fragmentectomy and Nucleoplasty for Sequestrated Lumbar Disc Herniation -- Resorption of Autogenous Bone Graft in Cranioplasty: Resorption and Reintegration Failure -- Clinical Analysis of Risk Factors for Recurrence in Patients with Chronic Subdural Hematoma Undergoing Burr Hole Trephination -- Multiple Episodes of Hemorrhage Identified in MRI of Chronic Subdural Hematomas -- Serial Brain CT Scans in Severe Head Injury without Intracranial Pressure Monitoring -- Central Pontine and Extrapontine Myelinolysis in a Patient with Traumatic Brain Injury Following Not Rapid Correction of Hyponatremia: A Case Report…”
    Revista digital
  9. 6709
    Tabla de Contenidos: “…Thinking of Business Processes Systematically -- From Language Acquisition to Subject-oriented Modeling -- The Integrated S-BPM Process Model -- Subject-oriented Process Analysis -- Modeling Processes in a Subject-Oriented Way -- Subject-Oriented Modeling by Construction and Restriction -- Subject-oriented Validation of Processes and Process Models -- Subject-oriented Optimization of Processes -- Organization-specific Implementation of Subject-oriented Processes -- IT-Implementation of Subject-Oriented Business Processes -- Subject-oriented Monitoring of Processes -- A Precise Description of the S-BPM Modeling Method -- Tools for S-BPM -- S-BPM Method by Comparison -- Conclusion -- A Subject-Oriented Interpreter Model for S-BPM…”
    Libro electrónico
  10. 6710
    por Knapp, Eric
    Publicado 2011
    Tabla de Contenidos: “…Machine generated contents note: Chapter 1: Introduction Chapter 2: About Industrial Networks Chapter 3: Introduction to Industrial Network Security Chapter 4: Industrial Network Protocols Chapter 5: How Industrial Networks Operate Chapter 6: Vulnerability and Risk Assessment Chapter 7: Establishing Secure Enclaves Chapter 8: Exception, Anomaly and Threat Detection Chapter 9: Monitoring Enclaves Chapter 10: Standards and Regulations Chapter 11: Common Pitfalls and Mistakes Appendix A: Protocol Resources Appendix B: Standards Organizations Appendix C: NIST Security Guidelines Glossary…”
    Libro electrónico
  11. 6711
    Publicado 2020
    Tabla de Contenidos: “…Load Balancers -- 9. Notifications and Monitoring -- Part III. Applications -- 10. SQL Developer Web -- 11. …”
    Libro electrónico
  12. 6712
    Publicado 2017
    Tabla de Contenidos: “…Green project cost monitoring and closeout -- 5. Building information modeling (BIM) -- 6. …”
    Libro electrónico
  13. 6713
    Tabla de Contenidos: “…Services in Different Languages -- 13. Monitoring Your Services -- 14. Operational Excellence with Microservices…”
    Libro electrónico
  14. 6714
    por International Energy Agency.
    Publicado 2009
    Tabla de Contenidos: “…; Chapter 6 COMPUTERS AND MONITORS; Chapter 7 SET-TOP BOXES; Chapter 8 MISCELLANEOUS ICT AND CE EQUIPMENT; Chapter 9 CROSS-CUTTING ISSUES; Chapter 10 SUMMARY OF CONCLUSIONS AND RECOMMENDATIONS; ANNEX I SUMMARY OF ESTIMATED BAU, LLCC AND BAT ELECTRICITY CONSUMPTION…”
    Libro electrónico
  15. 6715
    por Callender, John 1962-
    Publicado 2002
    Tabla de Contenidos: “…Getting Your Tools in Order -- Getting Started with Perl -- Running a Form-to-Email Gateway -- Power Editing with Perl -- Parsing Text Files -- Generating HTML -- Regular Expressions Demystified -- Parsing Web Access Logs -- Date Arithmetic -- Generating a Web Access Report -- Link Checking -- Running a CGI Guestbook -- Running a CGI Search Tool -- Using HTML Templates -- Generating Links -- Writing Perl Modules -- Adding Pages via CGI Script -- Monitoring Search Engine Positioning -- Keeping Track of Users -- Storing Data in DBM Files -- Where to Go Next…”
    Libro electrónico
  16. 6716
    por Lahti, Christian, Peterson, Roderick
    Publicado 2005
    Tabla de Contenidos: “…; Chapter 5 Domain I: Planning and Organization; Chapter 6 Domain II: Acquisition and Implementation; Chapter 7 Domain III: Delivery and Support; Chapter 8 Domain IV: Monitoring; Chapter 9 Putting It All Together; Appendix A COBIT Control Objectives; Appendix B KNOPPIX Live CD Parameters; Appendix C The GNU General Public License; Appendix D CD Contents at a Glance; Index…”
    Libro electrónico
  17. 6717
    Publicado 2009
    Tabla de Contenidos: “…Business Agility: Sustainable Prosperity in a Relentlessly Competitive World; Contents; Microsoft Executive Leadership Series: Series Foreword; Preface; CHAPTER 1: Responsiveness Trumps Efficiency; CHAPTER 2: Generating Alpha; CHAPTER 3: Principles of the Responsive Organization; CHAPTER 4: Speed, Simplicity, and Boldness; CHAPTER 5: Strategically Focused, Tactically Responsive; CHAPTER 6: Thriving in a Competitive, Fast-Paced World; CHAPTER 7: Ya Gotta Wanna; CHAPTER 8: The Essence of Innovation; APPENDIX A: Executive Checklist for Monitoring Development Projects…”
    Libro electrónico
  18. 6718
    por Simmons, Ken
    Publicado 2009
    Tabla de Contenidos: “…Introducing Microsoft SQL Server 2008 -- New Feature Overview -- Pre-Installation Considerations -- Choosing a High-Availability Solution -- Getting Started -- Installing Microsoft SQL Server 2008 -- Upgrading to Microsoft SQL Server 2008 -- Post-Installation -- Administering Microsoft SQL Server 2008 -- Multi-Server Administration -- Managing Security Within the Database Engine -- Administering Database Objects -- Indexing for Performance -- Managing Backups -- Restore and Recovery Strategies -- Automating Routine Maintenance -- Troubleshooting and Tuning -- Monitoring Your Server -- Auditing SQL Server -- Managing Query Performance -- Conclusion -- Secrets to Excelling As a Professional DBA -- What’s Next?…”
    Libro electrónico
  19. 6719
    por AMATAYAKUL, MARGRET
    Publicado 2017
    Tabla de Contenidos: “…Introduction to workflow and process management in health care -- Workflow and process management overview -- Step 1: Assess readiness for workflow and process management -- Step 2: Compile process inventory -- Step 3: Select tools and train team -- Step 4: Map current workflows and processes -- Step 5: Obtain baseline data -- Step 6: Validate workflow and process maps -- Step 7: Identify process redesign opportunities -- Step 8: Conduct root cause analysis to redesign workflows and processes -- Step 9: Implement redesigned workflows and processes -- Step 10: Monitor goal achievement with redesigned workflows…”
    Libro electrónico
  20. 6720
    Publicado 2020
    Tabla de Contenidos: “…Chapter 1: Kubernetes Architecture -- Chapter 2: Kubernetes Networking -- Chapter 3: Threat Modeling -- Chapter 4: Applying the Principle of Least Privilege in Kubernetes -- Chapter 5: Configuring Kubernetes Security Boundaries -- Chapter 6: Securing Cluster Components -- Chapter 7: Authentication, Authorization, and Admission Control -- Chapter 8: Securing Kubernetes Pods -- Chapter 9: Image Scanning in DevOps Pipelines -- Chapter 10: Real-Time Monitoring and Resource Management of a Kubernetes Cluster -- Chapter 11: Defense in Depth -- Chapter 12: Analyzing and Detecting Crypto-Mining Attacks -- Chapter 13: Learning from Kubernetes CVEs…”
    Libro electrónico